Closed meichengg closed 6 years ago
Hi there @huyndnse63331. KickThemOut uses a regular nmap -sP
scan to identify online devices. Could you please upload a PoC screenshot? Thanks!
sorry for my late response, here i used kickthemout firstly, it gave me this
weird that im having 3-4 devices connected to the wifi, so i decided to use nmap to check
but i can't see my Apple device :|
Hey @huyndnse63331. Thanks for bringing it up; I was actually able to reproduce this and it seems that it's a bug. Nmap doesn't seem to be detecting all alive hosts. I will look into it asap.
thanks guys, let me know when the problem is fixed <3
any progress guys?
Hey there again @huyndnse63331. We are about to release a new version of KickThemOut with several changes. It should be coming out soon, so please be patient. :) Thanks!
Hi @huyndnse63331. Can you reproduce this with v2.0?
hi im testing it, will let you know in a few moments
the bug is still present https://medium.com/@thereallulz/bug-kickthemout-v2-0-42c0b475da5f
@huyndnse63331 @k4m4 I have tested how Apple/Android mobile devices behave on WiFi, and they are rarely responding to ARP requests because of battery saving reasons.
So they are not constantly (actively) connected to the WiFI, only if the device wants to connect to somewhere or load something. Then they connect back and if they see an ARP request they respond to it like others. But after these mobile devices are done with their stuff they turn their radios into power saving mode (or something similar) and not really care about whats going on in the network.
So all in all this is not a bug with nmap or KickThemOut, the only way to detect these devices is to run multiple scans until they show up, or run nmap/KickThemOut when they are actively using the network. (e.g watching a YouTube video)
@xdavidhu , hi sorry for my late response, u mentioned "run multiple scans", so does kickthemout support multi scans?
Hi @huyndnse63331. By multiple scans, David means scanning your network repeatedly until your device shows up. There's really nothing more you/we can do. If you know the IP address of your device, you can try spoofing it by using KickThemOut's new argument based attack feature (for more info run sudo python3 kickthemout.py -h
). Thanks!
Closing due to inactivity; assuming that the issue has been solved. If you are still experiencing a problem, please re-open this issue. Thanks!
I scanned myself using nmap and found my Apple device was up, but i used kickthemout it didn't show my Apple IP, so i think there's a problem with the scanning, please have a check